Skip Navigation
Get a Demo
 

NetSupport Manager

Popular among admins and adversaries alike, NetSupport Manager has been increasingly abused over the last few years.

#4

Overall Rank

4.5%

Customers Affected

NetSupport Manager

Popular among admins and adversaries alike, NetSupport Manager has been increasingly abused over the last few years.

#4

Overall Rank

4.5%

Customers Affected

Analysis

A legitimate remote access tool that has been in use for over 30 years, NetSupport Manager is one of the many remote monitoring and management (RMM) tools misused by adversaries. NetSupport Manager is so commonly misused that it’s frequently referred to by security researchers as a malicious remote access trojan (RAT) instead of a benign remote access tool. There are multiple reasons for this, the most significant being that a free trial version of NetSupport Manager is easily obtainable online.

While we’ve observed malicious use of NetSupport Manager since we began tracking it in 2020, abuse has significantly increased across the intervening years into 2025. NetSupport Manager first appeared in our monthly top 10 in February 2023. After almost making the cut in 2023, NetSupport Manager made it into the Threat Detection Report rankings as our seventh most prevalent threat in 2024, and landed at fourth for 2025. August 2025 marked the first time NetSupport Manager hit number 1 in our monthly Intelligence Insights, and we saw a 50 percent year-over-year increase in activity compared to 2024.

Observed malicious NetSupport Manager use since 2022

NetSupport Manager is so commonly misused that it’s frequently referred to by security researchers as a malicious remote access trojan (RAT) instead of a benign remote access tool.

Related threats

We’ve seen NetSupport Manager leveraged as both a primary payload in its own right, as well as a follow-on payload delivered by other threats and techniques in our top 10. In 2025, Scarlet Goldfinch—the sixth most prevalent threat we detected—used NetSupport Manager as a primary or follow-on payload. In previous years, we’ve seen NetSupport Manager delivered alongside other threats as well, like FakeSG, SocGholish, Qbot, and via MSIX campaigns.

Far and away the most common delivery vehicle for NetSupport Manager in 2025 was T1204.004: Malicious Copy and Paste, our eighth most prevalent technique this year. Not only was NetSupport Manager the primary payload for a number of independent paste-and-run campaigns, Scarlet Goldfinch also used the technique to deliver NetSupport Manager. Historically, adversaries have delivered NetSupport Manager as a part of many campaigns, so initial delivery methods can vary widely. Malicious NetSupport Manager can be the result of phishing campaigns, fake updates, fake CAPTCHA lures, and more.

Breaking down the parts

NetSupport Manager has several components:

  • NetSupport Manager Client is the component that is installed on systems the adversary wants to control. When we refer to NetSupport Manager, this is typically the component we are referring to.
  • NetSupport Manager Control is the component used on the controlling workstation. This component allows adversaries to upload and execute files.
  • NetSupport Manager Deploy is a component on the controlling workstation that creates some software packaging for deployment, though it does not play an active role after the client is installed.

Legitimate NetSupport installs are often found in the Program Files directory, using the standard filename client32.exe. Suspect instances may be found by looking for client32.exe running from a non-standard directory, such as a user’s Downloads or Roaming folder.

It’s not unusual for adversaries to rename the NetSupport Manager Client file, so looking for binaries with the internal name client32 making network connections to netsupportsoftware[.]com is another good indicator of suspicious NetSupport Manager use.

Take action

Having the ability to collect and inspect binary signature metadata and binary naming conventions, as well as understanding common and uncommon installation paths for RMM tools like NetSupport Manager are the basic prerequisites for developing an effective detection strategy. Of course, the sheer volume of RMM tools available to adversaries, let alone abused by them, renders confident detection coverage a tall order.

The best generic advice for mitigating the risk posed by NetSupport Manager is to create robust allow/blocklist policies and strictly adhere to them.

Detection opportunities

Detection opportunity: NetSupport running from an unexpected directory

Under normal circumstances, you should expect NetSupport Manager to run from the programfiles directory. If you find NetSupport Manager—often identifiable as client32.exe—running outside the programfiles directory, particularly from the programdata directory, then it’s worth investigating. In instances where an adversary like FIN7 delivered NetSupport Manager as a follow-on payload, it is frequently observed running from a suspicious location like programdata or a user’s directory.

process == (client32.exe)
&&
file_path_includes (programdata)

Surveyor

You can search your environment for the presence of unsanctioned RMM tools, including NetSupport Manager, using our open source baselining tool Surveyor.

Testing

Start testing your defenses against NetSupport Manager using Atomic Red Team—an open source testing framework of small, highly portable detection tests mapped to MITRE ATT&CK.

Getting started

Tests associated with the following ATT&CK techniques may help you validate your coverage for behavior related to NetSupport Manager.

Review and repeat

Now that you have executed one or several common tests and checked for the expected results, it’s useful to answer some immediate questions:

  • Were any of your actions detected?
  • Were any of your actions blocked or prevented?
  • Were your actions visible in logs or other defensive telemetry?

Repeat this process, performing additional tests related to this technique. You can also create and contribute tests of your own.

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top